IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
1 - 25 of 1639 Matches Previous Page  |  Next Page
The True Cost of Cloud Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how higher security in the cloud is the ultimate cost savings measure, even if it appears costly up front.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

Case Study: Enhancing a Leading Bank's File Monitoring
sponsored by Varonis
WHITE PAPER: This case study describes how a leading bank is able to monitor every bit of its data, down to the last file touch.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: Download and discover how hackers are using app sideloading to take advantage of your enterprise provisioning, and learn how you can manage the emerging security threats.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Technical Considerations for Mobility in the Enterprise
sponsored by Data#3
WHITE PAPER: In this white paper, you'll learn how to look beyond MDM and security to see other important mobile components like workspace services and workspace delivery.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Data#3

Cybercrime Readiness in Europe
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Hewlett-Packard Limited

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Limiting Widespread Data Access
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Case Study: Boston University Achieves Heightened Protection for Sensitive Data
sponsored by Varonis
WHITE PAPER: Access this case study to discover how Boston University implemented DLP that gives insight into both where sensitive data is located and who has access to it.
Posted: 24 Jun 2015 | Published: 01 Jan 2014

Varonis

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 24 Jun 2015 | Published: 29 Dec 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Infographic: Statistics for Cyber Security
sponsored by IBM
WHITE PAPER: This infographic helps you learn what you're up against by giving you some numbers and statistics behind the growing problem of cybercrime.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Strategy Considerations for Building a Security Operations Center
sponsored by IBM
WHITE PAPER: This white paper discusses the benefits of SOCs and gives essential advice on designing one that will work for you.
Posted: 24 Jun 2015 | Published: 31 Dec 2013

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine what a data breach will cost your organization.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Your Move to the Cloud: A Managed Services Opportunity
sponsored by AVG Technologies
WHITE PAPER: This white paper presents the various cloud security business avenues available as well as the pros and cons to each.
Posted: 23 Jun 2015 | Published: 25 Mar 2015

AVG Technologies

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Critical Capabilities for Enterprise Mobility Management Suites
sponsored by Citrix
WHITE PAPER: Read the complete report now to find out more about the enterprise mobility landscape and which EMM capabilities are best suited for your unique environment.
Posted: 22 Jun 2015 | Published: 09 Jun 2015

Citrix

5 Reasons to Move Up to XenApp 7.5
sponsored by Citrix
WHITE PAPER: Read this white paper for five reasons to move up to XenApp 7.5. Give IT everything they need to meet the needs of today's modern workforce and empower users with on-demand self-service to enterprise apps.
Posted: 22 Jun 2015 | Published: 31 Jan 2014

Citrix

Managed Services for any Cloud Model
sponsored by Dimension Data
WHITE PAPER: This white paper explores service delivery platforms and managed services that allow enterprises to choose the type of cloud that best fits their needs—private, public, or hybrid.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Dimension Data

Corporate Data: A Protected Asset or a Ticking Time Bomb?
sponsored by Varonis
WHITE PAPER: Access this white paper for in-depth research into the growing risks and challenges to productivity that data growth and a lack of internal controls currently present for organizations of all sizes.
Posted: 19 Jun 2015 | Published: 31 Dec 2014

Varonis

IDC EMM Buyer Case Study: CommunityOne Bank
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn how CommunityOne Bank, a medium-sized financial institution, benefits from an EMM solution that provides secure mobile device management (MDM) and flexible service delivery.
Posted: 18 Jun 2015 | Published: 31 Mar 2015

Good Technology

Top Considerations for Defining a Successful BYOD Strategy
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn the 6 key tips that show you how to implement a BYOD strategy that can ultimately deliver the business benefits you're looking for.
Posted: 18 Jun 2015 | Published: 31 Jul 2014

Good Technology
1 - 25 of 1639 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement